Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
Satoshimines Bot v.1.5/Satoshimines Bot v.1.5.exe
Resource
win7-20240221-en
General
-
Target
Satoshimines Bot v.1.5/Satoshimines Bot v.1.5.exe
-
Size
828KB
-
MD5
3cc0ae207c7597abbe76ba8d60465d00
-
SHA1
1117b9cc9ffeb6b1ae95c97c5dd00bf024d24749
-
SHA256
e2f3cafdafc0f70cdde815608b64021924b0f692b3eeeebaf21f43170d842697
-
SHA512
23ffddaad4e792e6968e84b96a44dccca3b761edc3d09c95d69da5fbfb046f3687368f70a6d606f2311676c9aa7861d38555ca5c6c9e619a85eea9e7352abdd5
-
SSDEEP
12288:/nugCZKX4u2O1jUQLl4xohDzKi/WwYvcBwg61ikvvA33cBU7keVZ:2gCQXFFLl44DWPcBwg6osvA3x7kAZ
Malware Config
Extracted
darkcomet
Guest16
lisa000.hopto.org:1606
DC_MUTEX-Q6C5RK4
-
gencode
f2TScExw93wd
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Satoshimines Bot v.1.5.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\z7WJ0VV41XJKVUuN\\XdeykwG4mqsG.exe\",explorer.exe" Satoshimines Bot v.1.5.exe -
Processes:
resource yara_rule behavioral2/memory/1440-6-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-7-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-11-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-13-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-12-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-14-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-15-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-19-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-20-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-21-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-22-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-23-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-24-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-25-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-26-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-27-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-28-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-29-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-30-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-31-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-32-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-33-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Satoshimines Bot v.1.5.exedescription pid process target process PID 1896 set thread context of 1440 1896 Satoshimines Bot v.1.5.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Satoshimines Bot v.1.5.exepid process 1896 Satoshimines Bot v.1.5.exe 1896 Satoshimines Bot v.1.5.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
Satoshimines Bot v.1.5.exevbc.exedescription pid process Token: SeDebugPrivilege 1896 Satoshimines Bot v.1.5.exe Token: SeDebugPrivilege 1896 Satoshimines Bot v.1.5.exe Token: SeIncreaseQuotaPrivilege 1440 vbc.exe Token: SeSecurityPrivilege 1440 vbc.exe Token: SeTakeOwnershipPrivilege 1440 vbc.exe Token: SeLoadDriverPrivilege 1440 vbc.exe Token: SeSystemProfilePrivilege 1440 vbc.exe Token: SeSystemtimePrivilege 1440 vbc.exe Token: SeProfSingleProcessPrivilege 1440 vbc.exe Token: SeIncBasePriorityPrivilege 1440 vbc.exe Token: SeCreatePagefilePrivilege 1440 vbc.exe Token: SeBackupPrivilege 1440 vbc.exe Token: SeRestorePrivilege 1440 vbc.exe Token: SeShutdownPrivilege 1440 vbc.exe Token: SeDebugPrivilege 1440 vbc.exe Token: SeSystemEnvironmentPrivilege 1440 vbc.exe Token: SeChangeNotifyPrivilege 1440 vbc.exe Token: SeRemoteShutdownPrivilege 1440 vbc.exe Token: SeUndockPrivilege 1440 vbc.exe Token: SeManageVolumePrivilege 1440 vbc.exe Token: SeImpersonatePrivilege 1440 vbc.exe Token: SeCreateGlobalPrivilege 1440 vbc.exe Token: 33 1440 vbc.exe Token: 34 1440 vbc.exe Token: 35 1440 vbc.exe Token: 36 1440 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 1440 vbc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Satoshimines Bot v.1.5.exedescription pid process target process PID 1896 wrote to memory of 1440 1896 Satoshimines Bot v.1.5.exe vbc.exe PID 1896 wrote to memory of 1440 1896 Satoshimines Bot v.1.5.exe vbc.exe PID 1896 wrote to memory of 1440 1896 Satoshimines Bot v.1.5.exe vbc.exe PID 1896 wrote to memory of 1440 1896 Satoshimines Bot v.1.5.exe vbc.exe PID 1896 wrote to memory of 1440 1896 Satoshimines Bot v.1.5.exe vbc.exe PID 1896 wrote to memory of 1440 1896 Satoshimines Bot v.1.5.exe vbc.exe PID 1896 wrote to memory of 1440 1896 Satoshimines Bot v.1.5.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Satoshimines Bot v.1.5\Satoshimines Bot v.1.5.exe"C:\Users\Admin\AppData\Local\Temp\Satoshimines Bot v.1.5\Satoshimines Bot v.1.5.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4080,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=3976 /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1440-25-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-26-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-19-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-32-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-6-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-7-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-10-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-11-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-13-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-12-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-14-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-15-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-31-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-30-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-33-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-29-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-20-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-21-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-22-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-23-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-24-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-28-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1440-27-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1896-1-0x0000000075130000-0x00000000756E1000-memory.dmpFilesize
5.7MB
-
memory/1896-0-0x0000000075132000-0x0000000075133000-memory.dmpFilesize
4KB
-
memory/1896-2-0x0000000075130000-0x00000000756E1000-memory.dmpFilesize
5.7MB
-
memory/1896-17-0x0000000075130000-0x00000000756E1000-memory.dmpFilesize
5.7MB
-
memory/1896-16-0x0000000075132000-0x0000000075133000-memory.dmpFilesize
4KB
-
memory/1896-3-0x0000000075130000-0x00000000756E1000-memory.dmpFilesize
5.7MB
-
memory/1896-18-0x0000000075130000-0x00000000756E1000-memory.dmpFilesize
5.7MB